const char *locale, uid_t uid, char **query, GList **bind_params)
{
int joined = 0;
- size_t len = 0;
char *condition = NULL;
char buf[MAX_QUERY_LEN] = { '\0' };
char tmp_query[MAX_QUERY_LEN] = { '\0' };
if (!filter)
return PMINFO_R_OK;
- strncat(buf, " WHERE 1=1", MAX_QUERY_LEN - len - 1);
- len += strlen(" WHERE 1=1");
+ strncat(buf, " WHERE 1=1", sizeof(buf) - strlen(buf) - 1);
for (list = filter->list; list; list = list->next) {
joined |= __get_filter_condition(list->data, uid, &condition, bind_params);
if (condition == NULL)
continue;
- strncat(buf, " AND ", MAX_QUERY_LEN - len - 1);
- len += strlen(" AND ");
+ strncat(buf, " AND ", sizeof(buf) - strlen(buf) - 1);
- strncat(buf, condition, sizeof(buf) - len - 1);
- len += strlen(condition);
+ strncat(buf, condition, sizeof(buf) - strlen(buf) - 1);
free(condition);
condition = NULL;
}
- if (filter->list_metadata) {
- strncat(buf, " AND (", MAX_QUERY_LEN - len - 1);
- len += strlen(" AND (");
- }
+ if (filter->list_metadata)
+ strncat(buf, " AND (", sizeof(buf) - strlen(buf) - 1);
for (list = filter->list_metadata; list; list = list->next) {
joined |= __get_metadata_filter_condition(list->data,
&condition, bind_params);
if (condition == NULL)
continue;
- strncat(buf, condition, sizeof(buf) - len - 1);
- len += strlen(condition);
+ strncat(buf, condition, sizeof(buf) - strlen(buf) - 1);
free(condition);
condition = NULL;
- strncat(buf, " OR ", MAX_QUERY_LEN - len - 1);
- len += strlen(" OR ");
- }
- if (filter->list_metadata) {
- strncat(buf, "1=0)", MAX_QUERY_LEN - len - 1);
- len += strlen("1=0)");
+ strncat(buf, " OR ", sizeof(buf) - strlen(buf) - 1);
}
+ if (filter->list_metadata)
+ strncat(buf, "1=0)", sizeof(buf) - strlen(buf) - 1);
if (joined & E_PMINFO_APPINFO_JOIN_LOCALIZED_INFO) {
- strncat(tmp_query, join_localized_info, MAX_QUERY_LEN - len - 1);
- len += strlen(join_localized_info);
+ strncat(tmp_query, join_localized_info, sizeof(tmp_query) - strlen(tmp_query) - 1);
*bind_params = g_list_append(*bind_params, strdup(locale));
}
- if (joined & E_PMINFO_APPINFO_JOIN_CATEGORY) {
- strncat(tmp_query, join_category, MAX_QUERY_LEN - len - 1);
- len += strlen(join_category);
- }
- if (joined & E_PMINFO_APPINFO_JOIN_APP_CONTROL) {
- strncat(tmp_query, join_app_control, MAX_QUERY_LEN - len - 1);
- len += strlen(join_app_control);
- }
- if (joined & E_PMINFO_APPINFO_JOIN_METADATA) {
- strncat(tmp_query, join_metadata, MAX_QUERY_LEN - len - 1);
- len += strlen(join_metadata);
- }
+ if (joined & E_PMINFO_APPINFO_JOIN_CATEGORY)
+ strncat(tmp_query, join_category, sizeof(tmp_query) - strlen(tmp_query) - 1);
+ if (joined & E_PMINFO_APPINFO_JOIN_APP_CONTROL)
+ strncat(tmp_query, join_app_control, sizeof(tmp_query) - strlen(tmp_query) - 1);
+ if (joined & E_PMINFO_APPINFO_JOIN_METADATA)
+ strncat(tmp_query, join_metadata, sizeof(tmp_query) - strlen(tmp_query) - 1);
- strncat(tmp_query, buf, MAX_QUERY_LEN - len - 1);
- len += strlen(buf);
+ strncat(tmp_query, buf, sizeof(tmp_query) - strlen(tmp_query) - 1);
*query = strdup(tmp_query);
if (*query == NULL)
return;
dup = strdup(appcontrol_str);
+ if (dup == NULL) {
+ _LOGE("out of memory");
+ return;
+ }
+
do {
ac = calloc(1, sizeof(appcontrol_x));
if (ac == NULL) {
static gint __disable_chk_func(gconstpointer data1, gconstpointer data2)
{
pkgmgrinfo_node_x *node = (pkgmgrinfo_node_x *)data1;
- pkgmgrinfo_appinfo_disable_type *value =
- (pkgmgrinfo_appinfo_disable_type *)data2;
+ pkgmgrinfo_appinfo_disable_type value = GPOINTER_TO_INT(data2);
if (value == E_APPINFO_DISABLE_TYPE_PKG)
return (node->prop == E_PMINFO_APPINFO_PROP_PKG_DISABLE)
if (filter == NULL)
return false;
- link = g_slist_find_custom(filter->list, &type, __disable_chk_func);
+ link = g_slist_find_custom(filter->list, GINT_TO_POINTER(type), __disable_chk_func);
if (link)
return true;
"ON (ai.app_id=ui.app_id AND ui.uid=?)";
int ret = PMINFO_R_ERROR;
int idx;
- int len = 0;
char *dbpath;
char *bg_category_str = NULL;
char *constraint = NULL;
}
free(dbpath);
- len = strlen(query_raw);
snprintf(query, MAX_QUERY_LEN - 1, "%s", query_raw);
if (flag & PMINFO_APPINFO_GET_BASICINFO) {
- strncat(query, query_basic, MAX_QUERY_LEN - len - 1);
- len += strlen(query_basic);
- strncat(query, query_uid_info, MAX_QUERY_LEN - len - 1);
- len += strlen(query_uid_info);
+ strncat(query, query_basic, sizeof(query) - strlen(query) - 1);
+ strncat(query, query_uid_info, sizeof(query) - strlen(query) - 1);
}
if (flag & PMINFO_APPINFO_GET_LABEL) {
- strncat(query, query_label, MAX_QUERY_LEN - len - 1);
- len += strlen(query_label);
+ strncat(query, query_label, sizeof(query) - strlen(query) - 1);
bind_params = g_list_append(bind_params, strdup(locale));
}
if (flag & PMINFO_APPINFO_GET_ICON) {
- strncat(query, query_icon, MAX_QUERY_LEN - len - 1);
- len += strlen(query_icon);
+ strncat(query, query_icon, sizeof(query) - strlen(query) - 1);
bind_params = g_list_append(bind_params, strdup(locale));
}
LOGE("Failed to get WHERE clause");
goto catch;
}
- strncat(query, query_from_clause, MAX_QUERY_LEN - len - 1);
- len += strlen(query_from_clause);
+ strncat(query, query_from_clause, sizeof(query) - strlen(query) - 1);
- strncat(query, query_uid_info_clause, MAX_QUERY_LEN - len - 1);
- len += strlen(query_uid_info_clause);
+ strncat(query, query_uid_info_clause, sizeof(query) - strlen(query) - 1);
if (constraint)
- strncat(query, constraint, MAX_QUERY_LEN - len - 1);
+ strncat(query, constraint, sizeof(query) - strlen(query) - 1);
ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
if (ret != SQLITE_OK) {
strcasecmp(tmp_record, "false") == 0) {
free(info->is_disabled);
info->is_disabled = tmp_record;
+ } else {
+ free(tmp_record);
}
}
tmp_record = NULL;
strcasecmp(tmp_record, "false") == 0) {
free(info->splash_screen_display);
info->splash_screen_display = tmp_record;
+ } else {
+ free(tmp_record);
}
}
}
if (locale == NULL)
return PMINFO_R_ERROR;
- list = g_hash_table_new(g_str_hash, g_str_equal);
+ list = g_hash_table_new_full(g_str_hash, g_str_equal, NULL,
+ __free_applications);
if (list == NULL) {
free(locale);
return PMINFO_R_ERROR;
ret = _appinfo_get_applications(GLOBAL_USER, uid, locale, filter,
PMINFO_APPINFO_GET_ALL, list);
+ if (ret != PMINFO_R_OK) {
+ g_hash_table_destroy(list);
+ free(locale);
+ return ret;
+ }
+
if (!g_hash_table_size(list)) {
- _LOGI("appinfo for [%s] is not existed for user [%d]",
+ _LOGD("appinfo for [%s] is not existed for user [%d]",
appid, uid);
g_hash_table_destroy(list);
free(locale);
info->package = strdup(info->app_info->package);
/* just free list only */
+ g_hash_table_steal(list, (gconstpointer)appid);
g_hash_table_destroy(list);
*handle = info;
return PMINFO_R_OK;
}
-API int pkgmgrinfo_appinfo_usr_get_datacontrol_info(const char *providerid,
- const char *type, uid_t uid, char **appid, char **access)
+static int _appinfo_get_datacontrol_info(sqlite3 *db, const char *providerid,
+ const char *type, char **appid, char **access)
{
- retvm_if(providerid == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
- retvm_if(type == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
- retvm_if(appid == NULL, PMINFO_R_EINVAL, "Argument supplied to hold return value is NULL\n");
- retvm_if(access == NULL, PMINFO_R_EINVAL, "Argument supplied to hold return value is NULL\n");
-
- int ret = PMINFO_R_OK;
- char *query = NULL;
- sqlite3_stmt *stmt = NULL;
+ static const char query[] =
+ "SELECT app_id, access FROM package_app_data_control "
+ "WHERE providerid=? AND type=?";
+ int ret;
+ sqlite3_stmt *stmt;
- /*open db*/
- ret = __open_manifest_db(uid, true);
- retvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "connect db [%s] failed!", MANIFEST_DB);
+ ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
+ if (ret != SQLITE_OK) {
+ LOGE("prepare failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
- /*Start constructing query*/
- query = sqlite3_mprintf("select * from package_app_data_control where providerid=%Q and type=%Q", providerid, type);
- tryvm_if(query == NULL, ret = PMINFO_R_ERROR, "Out of memory");
+ ret = sqlite3_bind_text(stmt, 1, providerid, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
- /*prepare query*/
- ret = sqlite3_prepare_v2(GET_DB(manifest_db), query, strlen(query), &stmt, NULL);
- tryvm_if(ret != PMINFO_R_OK, ret = PMINFO_R_ERROR, "sqlite3_prepare_v2 failed[%s]\n", query);
+ ret = sqlite3_bind_text(stmt, 2, type, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
- /*step query*/
ret = sqlite3_step(stmt);
- tryvm_if((ret != SQLITE_ROW) || (ret == SQLITE_DONE), ret = PMINFO_R_ERROR, "No records found");
+ if (ret != SQLITE_ROW) {
+ sqlite3_finalize(stmt);
+ if (ret == SQLITE_DONE) {
+ return PMINFO_R_ENOENT;
+ } else {
+ LOGE("step error: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+ }
*appid = strdup((char *)sqlite3_column_text(stmt, 0));
- *access = strdup((char *)sqlite3_column_text(stmt, 2));
-
- ret = PMINFO_R_OK;
+ if (*appid == NULL) {
+ LOGE("out of memory");
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
+ *access = strdup((char *)sqlite3_column_text(stmt, 1));
+ if (*access == NULL) {
+ LOGE("out of memory");
+ free(*appid);
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
-catch:
- sqlite3_free(query);
sqlite3_finalize(stmt);
- __close_manifest_db();
+
+ return PMINFO_R_OK;
+}
+
+static int _pkgmgrinfo_appinfo_get_datacontrol_info(uid_t uid,
+ const char *providerid, const char *type,
+ char **appid, char **access)
+{
+ int ret;
+ char *dbpath;
+ sqlite3 *db;
+
+ dbpath = getUserPkgParserDBPathUID(GLOBAL_USER);
+ if (dbpath == NULL)
+ return PMINFO_R_ERROR;
+
+ ret = __open_db(dbpath, &db, SQLITE_OPEN_READONLY);
+ free(dbpath);
+ if (ret != SQLITE_OK) {
+ LOGE("open db failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+
+ ret = _appinfo_get_datacontrol_info(db, providerid, type, appid,
+ access);
+ sqlite3_close_v2(db);
+
+ return ret;
+}
+
+API int pkgmgrinfo_appinfo_usr_get_datacontrol_info(const char *providerid,
+ const char *type, uid_t uid, char **appid, char **access)
+{
+ int ret;
+
+ if (providerid == NULL || type == NULL || appid == NULL ||
+ access == NULL) {
+ LOGE("invalid parameter");
+ return PMINFO_R_EINVAL;
+ }
+
+ ret = _pkgmgrinfo_appinfo_get_datacontrol_info(GLOBAL_USER, providerid,
+ type, appid, access);
+ if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
+ ret = _pkgmgrinfo_appinfo_get_datacontrol_info(uid, providerid,
+ type, appid, access);
+
+ /* FIXME: It should return PMINFO_R_ENOENT but to keep previous
+ * implementation, return PMINFO_R_ERROR. This should be
+ * modified later...
+ */
+ if (ret == PMINFO_R_ENOENT) {
+ LOGE("no datacontrol info of %s", providerid);
+ ret = PMINFO_R_ERROR;
+ }
+
return ret;
}
type, _getuid(), appid, access);
}
-API int pkgmgrinfo_appinfo_usr_get_datacontrol_appid(const char *providerid, uid_t uid, char **appid)
+static int _appinfo_get_datacontrol_appid(sqlite3 *db, const char *providerid,
+ char **appid)
{
- retvm_if(providerid == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
- retvm_if(appid == NULL, PMINFO_R_EINVAL, "Argument supplied to hold return value is NULL\n");
-
- int ret = PMINFO_R_OK;
- char *query = NULL;
- sqlite3_stmt *stmt = NULL;
-
- /*open db*/
- ret = __open_manifest_db(uid, true);
- retvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "connect db [%s] failed!", MANIFEST_DB);
+ static const char query[] =
+ "SELECT app_id FROM package_app_data_control "
+ "WHERE providerid=?";
+ int ret;
+ sqlite3_stmt *stmt;
- /*Start constructing query*/
- query = sqlite3_mprintf("select * from package_app_data_control where providerid=%Q", providerid);
- tryvm_if(query == NULL, ret = PMINFO_R_ERROR, "Out of memory");
+ ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
+ if (ret != SQLITE_OK) {
+ LOGE("prepare failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
- /*prepare query*/
- ret = sqlite3_prepare_v2(GET_DB(manifest_db), query, strlen(query), &stmt, NULL);
- tryvm_if(ret != PMINFO_R_OK, ret = PMINFO_R_ERROR, "sqlite3_prepare_v2 failed[%s]\n", query);
+ ret = sqlite3_bind_text(stmt, 1, providerid, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
- /*step query*/
ret = sqlite3_step(stmt);
- tryvm_if((ret != SQLITE_ROW) || (ret == SQLITE_DONE), ret = PMINFO_R_ERROR, "No records found");
+ if (ret != SQLITE_ROW) {
+ sqlite3_finalize(stmt);
+ if (ret == SQLITE_DONE) {
+ return PMINFO_R_ENOENT;
+ } else {
+ LOGE("step error: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+ }
*appid = strdup((char *)sqlite3_column_text(stmt, 0));
- ret = PMINFO_R_OK;
-
-catch:
- sqlite3_free(query);
sqlite3_finalize(stmt);
- __close_manifest_db();
+
+ if (*appid == NULL) {
+ LOGE("out of memory");
+ return PMINFO_R_ERROR;
+ }
+
+ return PMINFO_R_OK;
+}
+
+static int _pkgmgrinfo_appinfo_get_datacontrol_appid(uid_t uid,
+ const char *providerid, char **appid)
+{
+ int ret;
+ char *dbpath;
+ sqlite3 *db;
+
+ dbpath = getUserPkgParserDBPathUID(GLOBAL_USER);
+ if (dbpath == NULL)
+ return PMINFO_R_ERROR;
+
+ ret = __open_db(dbpath, &db, SQLITE_OPEN_READONLY);
+ free(dbpath);
+ if (ret != SQLITE_OK) {
+ LOGE("open db failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+
+ ret = _appinfo_get_datacontrol_appid(db, providerid, appid);
+ sqlite3_close_v2(db);
+
+ return ret;
+}
+
+API int pkgmgrinfo_appinfo_usr_get_datacontrol_appid(const char *providerid,
+ uid_t uid, char **appid)
+{
+ int ret;
+
+ if (providerid == NULL || appid == NULL) {
+ LOGE("invalid parameter");
+ return PMINFO_R_EINVAL;
+ }
+
+ ret = _pkgmgrinfo_appinfo_get_datacontrol_appid(GLOBAL_USER, providerid,
+ appid);
+ if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
+ ret = _pkgmgrinfo_appinfo_get_datacontrol_appid(uid, providerid,
+ appid);
+
+ /* FIXME: It should return PMINFO_R_ENOENT but to keep previous
+ * implementation, return PMINFO_R_ERROR. This should be
+ * modified later...
+ */
+ if (ret == PMINFO_R_ENOENT) {
+ LOGE("no datacontrol appid of %s", providerid);
+ ret = PMINFO_R_ERROR;
+ }
+
return ret;
}
return pkgmgrinfo_appinfo_usr_get_datacontrol_appid(providerid, _getuid(), appid);
}
-API int pkgmgrinfo_appinfo_usr_get_datacontrol_trusted_info(const char *providerid,
- const char *type, uid_t uid, char **appid, bool *is_trusted)
+static int _appinfo_get_datacontrol_trusted_info(sqlite3 *db,
+ const char *providerid, const char *type, char **appid,
+ bool *is_trusted)
{
- retvm_if(providerid == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
- retvm_if(appid == NULL, PMINFO_R_EINVAL, "Argument supplied to hold return value is NULL\n");
-
- int ret = PMINFO_R_OK;
- char *query = NULL;
- sqlite3_stmt *stmt = NULL;
+ static const char query[] =
+ "SELECT app_id, trusted FROM package_app_data_control "
+ "WHERE providerid=? AND type=?";
+ int ret;
+ sqlite3_stmt *stmt;
- /*open db*/
- ret = __open_manifest_db(uid, true);
- retvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "connect db [%s] failed!", MANIFEST_DB);
+ ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
+ if (ret != SQLITE_OK) {
+ LOGE("prepare failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
- /*Start constructing query*/
- query = sqlite3_mprintf("SELECT app_id, trusted FROM package_app_data_control WHERE providerid=%Q AND type=%Q", providerid, type);
- tryvm_if(query == NULL, ret = PMINFO_R_ERROR, "Out of memory");
+ ret = sqlite3_bind_text(stmt, 1, providerid, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
- /*prepare query*/
- ret = sqlite3_prepare_v2(GET_DB(manifest_db), query, strlen(query), &stmt, NULL);
- tryvm_if(ret != PMINFO_R_OK, ret = PMINFO_R_ERROR, "sqlite3_prepare_v2 failed[%s]\n", query);
+ ret = sqlite3_bind_text(stmt, 2, type, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
- /*step query*/
ret = sqlite3_step(stmt);
- tryvm_if((ret != SQLITE_ROW) || (ret == SQLITE_DONE), ret = PMINFO_R_ERROR, "No records found");
+ if (ret != SQLITE_ROW) {
+ sqlite3_finalize(stmt);
+ if (ret == SQLITE_DONE) {
+ return PMINFO_R_ENOENT;
+ } else {
+ LOGE("step error: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+ }
- _save_column_str(stmt, 0, appid);
+ *appid = strdup((char *)sqlite3_column_text(stmt, 0));
*is_trusted = _get_bool_value((char *)sqlite3_column_text(stmt, 1));
- ret = PMINFO_R_OK;
-
-catch:
- sqlite3_free(query);
sqlite3_finalize(stmt);
- __close_manifest_db();
+
+ if (*appid == NULL) {
+ LOGE("out of memory");
+ return PMINFO_R_ERROR;
+ }
+
+ return PMINFO_R_OK;
+}
+
+static int _pkgmgrinfo_appinfo_get_datacontrol_trusted_info(uid_t uid,
+ const char *providerid, const char *type, char **appid,
+ bool *is_trusted)
+{
+ int ret;
+ char *dbpath;
+ sqlite3 *db;
+
+ dbpath = getUserPkgParserDBPathUID(GLOBAL_USER);
+ if (dbpath == NULL)
+ return PMINFO_R_ERROR;
+
+ ret = __open_db(dbpath, &db, SQLITE_OPEN_READONLY);
+ free(dbpath);
+ if (ret != SQLITE_OK) {
+ LOGE("open db failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+
+ ret = _appinfo_get_datacontrol_trusted_info(db, providerid, type, appid,
+ is_trusted);
+ sqlite3_close_v2(db);
+
+ return ret;
+}
+
+API int pkgmgrinfo_appinfo_usr_get_datacontrol_trusted_info(
+ const char *providerid, const char *type, uid_t uid,
+ char **appid, bool *is_trusted)
+{
+ int ret;
+
+ if (providerid == NULL || type == NULL || appid == NULL ||
+ is_trusted == NULL) {
+ LOGE("invalid parameter");
+ return PMINFO_R_EINVAL;
+ }
+
+ ret = _pkgmgrinfo_appinfo_get_datacontrol_trusted_info(GLOBAL_USER,
+ providerid, type, appid, is_trusted);
+ if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
+ ret = _pkgmgrinfo_appinfo_get_datacontrol_trusted_info(uid,
+ providerid, type, appid, is_trusted);
+
+ /* FIXME: It should return PMINFO_R_ENOENT but to keep previous
+ * implementation, return PMINFO_R_ERROR. This should be
+ * modified later...
+ */
+ if (ret == PMINFO_R_ENOENT) {
+ LOGE("no datacontrol trusted info of %s", providerid);
+ ret = PMINFO_R_ERROR;
+ }
+
return ret;
}
type, _getuid(), appid, is_trusted);
}
-API int pkgmgrinfo_appinfo_usr_foreach_datacontrol_privileges(const char *providerid, const char *type,
- pkgmgrinfo_pkg_privilege_list_cb privilege_func, void *user_data, uid_t uid)
+static int _appinfo_foreach_datacontrol_privileges(sqlite3 *db,
+ const char *providerid, const char *type,
+ pkgmgrinfo_pkg_privilege_list_cb callback, void *user_data)
{
- retvm_if(providerid == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
- retvm_if(privilege_func == NULL, PMINFO_R_EINVAL, "Callback function is NULL");
-
- int ret = PMINFO_R_OK;
- char *query = NULL;
- sqlite3_stmt *stmt = NULL;
+ static const char query[] =
+ "SELECT privilege FROM package_app_data_control_privilege "
+ "WHERE providerid=? AND type=?";
+ int ret;
+ sqlite3_stmt *stmt;
+ int count = 0;
- /*open db*/
- ret = __open_manifest_db(uid, true);
- retvm_if(ret != SQLITE_OK, ret = PMINFO_R_ERROR, "connect db [%s] failed!", MANIFEST_DB);
+ ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
+ if (ret != SQLITE_OK) {
+ LOGE("prepare failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
- /*Start constructing query*/
- query = sqlite3_mprintf("SELECT privilege FROM package_app_data_control_privilege "
- "WHERE providerid=%Q AND type=%Q", providerid, type);
- tryvm_if(query == NULL, ret = PMINFO_R_ERROR, "Out of memory");
+ ret = sqlite3_bind_text(stmt, 1, providerid, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
- /*prepare query*/
- ret = sqlite3_prepare_v2(GET_DB(manifest_db), query, strlen(query), &stmt, NULL);
- tryvm_if(ret != PMINFO_R_OK, ret = PMINFO_R_ERROR, "sqlite3_prepare_v2 failed[%s]\n", query);
+ ret = sqlite3_bind_text(stmt, 2, type, -1, SQLITE_STATIC);
+ if (ret != SQLITE_OK) {
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
+ return PMINFO_R_ERROR;
+ }
while (sqlite3_step(stmt) == SQLITE_ROW) {
- char *privilege;
- privilege = (char *)sqlite3_column_text(stmt, 0);
- ret = privilege_func(privilege, user_data);
+ count++;
+ ret = callback((const char *)sqlite3_column_text(stmt, 0),
+ user_data);
if (ret < 0)
break;
}
- ret = PMINFO_R_OK;
-
-catch:
- sqlite3_free(query);
sqlite3_finalize(stmt);
- __close_manifest_db();
+
+ return count ? PMINFO_R_OK : PMINFO_R_ENOENT;
+}
+
+static int _pkgmgrinfo_appinfo_foreach_datacontrol_privileges(uid_t uid,
+ const char *providerid, const char *type,
+ pkgmgrinfo_pkg_privilege_list_cb callback, void *user_data)
+{
+ int ret;
+ char *dbpath;
+ sqlite3 *db;
+
+ dbpath = getUserPkgParserDBPathUID(GLOBAL_USER);
+ if (dbpath == NULL)
+ return PMINFO_R_ERROR;
+
+ ret = __open_db(dbpath, &db, SQLITE_OPEN_READONLY);
+ free(dbpath);
+ if (ret != SQLITE_OK) {
+ LOGE("open db failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
+ }
+
+ ret = _appinfo_foreach_datacontrol_privileges(db, providerid, type,
+ callback, user_data);
+ sqlite3_close_v2(db);
+
return ret;
}
-API int pkgmgrinfo_appinfo_foreach_datacontrol_privileges(const char *providerid, const char *type,
- pkgmgrinfo_pkg_privilege_list_cb privilege_func, void *user_data)
+API int pkgmgrinfo_appinfo_usr_foreach_datacontrol_privileges(
+ const char *providerid, const char *type,
+ pkgmgrinfo_pkg_privilege_list_cb privilege_func,
+ void *user_data, uid_t uid)
{
- return pkgmgrinfo_appinfo_usr_foreach_datacontrol_privileges(providerid, type, privilege_func,
- user_data, _getuid());
+ int ret;
+
+ if (providerid == NULL || type == NULL || privilege_func == NULL) {
+ LOGE("invalid parameter");
+ return PMINFO_R_EINVAL;
+ }
+
+ ret = _pkgmgrinfo_appinfo_foreach_datacontrol_privileges(GLOBAL_USER,
+ providerid, type, privilege_func, user_data);
+ if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
+ ret = _pkgmgrinfo_appinfo_foreach_datacontrol_privileges(uid,
+ providerid, type, privilege_func, user_data);
+
+ if (ret == PMINFO_R_ENOENT)
+ ret = PMINFO_R_OK;
+
+ return ret;
+}
+
+API int pkgmgrinfo_appinfo_foreach_datacontrol_privileges(
+ const char *providerid, const char *type,
+ pkgmgrinfo_pkg_privilege_list_cb privilege_func,
+ void *user_data)
+{
+ return pkgmgrinfo_appinfo_usr_foreach_datacontrol_privileges(
+ providerid, type, privilege_func, user_data, _getuid());
}
API int pkgmgrinfo_appinfo_get_support_mode(pkgmgrinfo_appinfo_h handle, int *support_mode)
return PMINFO_R_OK;
}
-API int pkgmgrinfo_appinfo_usr_foreach_appcontrol_privileges(const char *appid,
- const char *operation, const char *uri, const char *mime,
- pkgmgrinfo_pkg_privilege_list_cb privilege_func,
- void *user_data, uid_t uid)
+static int _appinfo_foreach_appcontrol_privileges(sqlite3 *db,
+ const char *appid, const char *operation,
+ pkgmgrinfo_pkg_privilege_list_cb callback, void *user_data)
{
- static const char query_raw[] =
- "SELECT privilege FROM package_app_app_control_privilege "
- "WHERE app_id=%Q AND app_control=%Q";
+ static const char query[] =
+ "SELECT app_control, privilege FROM package_app_app_control_privilege "
+ "WHERE app_id=?";
int ret;
- char *query;
sqlite3_stmt *stmt;
- char *privilege;
- char app_control[BUFSIZE];
+ const char *app_control;
+ char *dup_app_control;
+ char *token;
+ char *saveptr = NULL;
+ const char *privilege;
+ int count = 0;
- if (appid == NULL || operation == NULL || privilege_func == NULL) {
- LOGE("invalid parameter");
- return PMINFO_R_EINVAL;
+ ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
+ if (ret != SQLITE_OK) {
+ LOGE("prepare failed: %s", sqlite3_errmsg(db));
+ return PMINFO_R_ERROR;
}
- snprintf(app_control, sizeof(app_control), "%s|%s|%s", operation,
- uri ? uri : "NULL", mime ? mime : "NULL");
-
- ret = __open_manifest_db(uid, true);
+ ret = sqlite3_bind_text(stmt, 1, appid, -1, SQLITE_STATIC);
if (ret != SQLITE_OK) {
- LOGE("open db failed");
+ LOGE("bind failed: %s", sqlite3_errmsg(db));
+ sqlite3_finalize(stmt);
return PMINFO_R_ERROR;
}
- query = sqlite3_mprintf(query_raw, appid, app_control);
- if (query == NULL) {
- LOGE("out of memory");
- __close_manifest_db();
- return PMINFO_R_ERROR;
+ while (sqlite3_step(stmt) == SQLITE_ROW) {
+ app_control = (const char *)sqlite3_column_text(stmt, 0);
+ if (!app_control)
+ continue;
+
+ dup_app_control = strdup(app_control);
+ if (!dup_app_control)
+ continue;
+
+ token = strtok_r(dup_app_control, "|", &saveptr);
+ if (token && !strcmp(token, operation)) {
+ count++;
+ privilege = (const char *)sqlite3_column_text(stmt, 1);
+ ret = callback(privilege, user_data);
+ if (ret < 0) {
+ free(dup_app_control);
+ break;
+ }
+ }
+ free(dup_app_control);
}
- ret = sqlite3_prepare_v2(GET_DB(manifest_db), query, strlen(query),
- &stmt, NULL);
- sqlite3_free(query);
- if (ret != PMINFO_R_OK) {
- LOGE("prepare failed: %s", sqlite3_errmsg(GET_DB(manifest_db)));
- __close_manifest_db();
+ sqlite3_finalize(stmt);
+
+ return count ? PMINFO_R_OK : PMINFO_R_ENOENT;
+}
+
+static int _pkgmgrinfo_appinfo_foreach_appcontrol_privileges(uid_t uid,
+ const char *appid, const char *operation,
+ pkgmgrinfo_pkg_privilege_list_cb callback, void *user_data)
+{
+ int ret;
+ char *dbpath;
+ sqlite3 *db;
+
+ dbpath = getUserPkgParserDBPathUID(uid);
+ if (dbpath == NULL)
+ return PMINFO_R_ERROR;
+
+ ret = __open_db(dbpath, &db, SQLITE_OPEN_READONLY);
+ free(dbpath);
+ if (ret != SQLITE_OK) {
+ LOGE("open db failed: %s", sqlite3_errmsg(db));
return PMINFO_R_ERROR;
}
- while (sqlite3_step(stmt) == SQLITE_ROW) {
- privilege = (char *)sqlite3_column_text(stmt, 0);
- ret = privilege_func(privilege, user_data);
- if (ret < 0)
- break;
+ ret = _appinfo_foreach_appcontrol_privileges(db, appid, operation,
+ callback, user_data);
+ sqlite3_close_v2(db);
+
+ return ret;
+}
+
+API int pkgmgrinfo_appinfo_usr_foreach_appcontrol_privileges(const char *appid,
+ const char *operation,
+ pkgmgrinfo_pkg_privilege_list_cb privilege_func,
+ void *user_data, uid_t uid)
+{
+ int ret;
+
+ if (appid == NULL || operation == NULL || privilege_func == NULL) {
+ LOGE("invalid parameter");
+ return PMINFO_R_EINVAL;
}
- sqlite3_finalize(stmt);
- __close_manifest_db();
+ ret = _pkgmgrinfo_appinfo_foreach_appcontrol_privileges(GLOBAL_USER,
+ appid, operation, privilege_func, user_data);
+ if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
+ ret = _pkgmgrinfo_appinfo_foreach_appcontrol_privileges(uid,
+ appid, operation, privilege_func, user_data);
- return PMINFO_R_OK;
+ if (ret == PMINFO_R_ENOENT)
+ ret = PMINFO_R_OK;
+
+ return ret;
}
API int pkgmgrinfo_appinfo_foreach_appcontrol_privileges(const char *appid,
- const char *operation, const char *uri, const char *mime,
+ const char *operation,
pkgmgrinfo_pkg_privilege_list_cb privilege_func,
void *user_data)
{
return pkgmgrinfo_appinfo_usr_foreach_appcontrol_privileges(appid,
- operation, uri, mime, privilege_func, user_data,
- _getuid());
+ operation, privilege_func, user_data, _getuid());
}
API int pkgmgrinfo_appinfo_foreach_appcontrol(pkgmgrinfo_appinfo_h handle,
for (tmp = info->app_info->appcontrol; tmp; tmp = tmp->next) {
appcontrol = (appcontrol_x *)tmp->data;
- if (appcontrol == NULL)
+ if (appcontrol == NULL || !strcasecmp(appcontrol->visibility, "remote-only"))
+ continue;
+ ret = appcontrol_func(appcontrol->operation, appcontrol->uri, appcontrol->mime, user_data);
+ if (ret < 0)
+ break;
+ }
+
+ return PMINFO_R_OK;
+}
+
+API int pkgmgrinfo_appinfo_foreach_remote_appcontrol(pkgmgrinfo_appinfo_h handle,
+ pkgmgrinfo_app_control_list_cb appcontrol_func, void *user_data)
+{
+ retvm_if(handle == NULL, PMINFO_R_EINVAL, "appinfo handle is NULL");
+ retvm_if(appcontrol_func == NULL, PMINFO_R_EINVAL, "Callback function is NULL");
+ int ret;
+ pkgmgr_appinfo_x *info = (pkgmgr_appinfo_x *)handle;
+ appcontrol_x *appcontrol;
+ GList *tmp;
+
+ if (info->app_info == NULL)
+ return PMINFO_R_ERROR;
+
+ for (tmp = info->app_info->appcontrol; tmp; tmp = tmp->next) {
+ appcontrol = (appcontrol_x *)tmp->data;
+ if (appcontrol == NULL || !strcasecmp(appcontrol->visibility, "local-only"))
continue;
ret = appcontrol_func(appcontrol->operation, appcontrol->uri, appcontrol->mime, user_data);
if (ret < 0)